Please turn on your JavaScript for this page to function normally.
professional
The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage

A perfect storm of regulation, increased threats and technological complexity is overwhelming cybersecurity decision makers, reveals new research from Symantec. Cybersecurity …

find
Researchers develop new technique to identify malware in embedded systems

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina …

skull
Most SMBs would pay a ransom in order to recover stolen data

More than half (55 percent) of executives at SMBs said they would pay hackers in order to recover their stolen data in ransomware attacks, according to the second quarterly …

HDD
A surprising number of used drives sold on eBay hold sensitive data

42% of used drives sold on eBay are holding sensitive data, with 15% containing personally identifiable information (PII), according to Blancco Technology Group. Conducted in …

connections
Week in review: Oracle WebLogic zero-day under attack, a new way to improve network security

Here’s an overview of some of last week’s most interesting news and articles: Qualcomm chips leak crypto data from secure execution environment A vulnerability in Qualcomm …

SD-WAN
Best practices when implementing SD-WAN

Telecoms is an overall complex business – delivering network circuits and optimizing connections – but SD-WAN has its own very specific set of obstacles. SD-WAN involves many …

MongoDB
Too fast, too insecure: Securing Mongo Express web administrative interfaces

Mongo Express is a lightweight web-based administrative interface deployed to manage MongoDB databases interactively. It is authored using Node.js, Express and Bootstrap …

consumer
Consumers trust banks most with their personal data, 68% still fear identity theft

People trust banks and other financial entities to safeguard their personal data more than other organizations. New nCipher Security research also illustrates how easily that …

finance
Global spending on digital transformation to reach $1.18 trillion in 2019

Enterprises around the world are making significant investments in the technologies and services that enable the digital transformation (DX) of their business models, products …

criminal
Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations …

Business
Established companies leveraging fintech capabilities for growth

As new technologies and regulations bring new opportunities and challenges to the financial services industry, nearly two-thirds of established companies are leveraging …

Oracle
Researchers flag new Oracle WebLogic zero-day RCE flaw

Attackers looking to compromise Oracle WebLogic servers for their own needs have a new zero-day RCE flaw at their disposal. “Oracle WebLogic wls9_async and wls-wsat …

Don't miss

Cybersecurity news